mirror of https://github.com/Aidaho12/haproxy-wi
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
824 lines
27 KiB
824 lines
27 KiB
#!/usr/bin/env python3
|
|
# -*- coding: utf-8 -*-"
|
|
import cgi
|
|
import os, sys
|
|
import funct
|
|
import sql
|
|
import asyncio
|
|
|
|
form = cgi.FieldStorage()
|
|
serv = form.getvalue('serv')
|
|
act = form.getvalue('act')
|
|
|
|
if form.getvalue('new_metrics') or form.getvalue('new_waf_metrics'):
|
|
print('Content-type: application/json\n')
|
|
else:
|
|
print('Content-type: text/html\n')
|
|
|
|
if act == "checkrestart":
|
|
servers = sql.get_dick_permit(ip=serv)
|
|
for server in servers:
|
|
if server != "":
|
|
print("ok")
|
|
sys.exit()
|
|
sys.exit()
|
|
|
|
if not sql.check_token_exists(form.getvalue('token')):
|
|
print("Your token has been expired")
|
|
sys.exit()
|
|
|
|
if form.getvalue('getcerts') is not None and serv is not None:
|
|
cert_path = sql.get_setting('cert_path')
|
|
commands = [ "ls -1t "+cert_path+" |grep pem" ]
|
|
try:
|
|
funct.ssh_command(serv, commands, ip="1")
|
|
except:
|
|
print('<div class="alert alert-danger" style="margin:0">Can not connect to the server</div>')
|
|
|
|
if form.getvalue('checkSshConnect') is not None and serv is not None:
|
|
try:
|
|
funct.ssh_command(serv, ["ls -1t"])
|
|
except:
|
|
print('<div class="alert alert-danger" style="margin:0">Can not connect to the server</div>')
|
|
|
|
if form.getvalue('getcert') is not None and serv is not None:
|
|
id = form.getvalue('getcert')
|
|
cert_path = sql.get_setting('cert_path')
|
|
commands = [ "cat "+cert_path+"/"+id ]
|
|
try:
|
|
funct.ssh_command(serv, commands, ip="1")
|
|
except:
|
|
print('<div class="alert alert-danger" style="margin:0">Can not connect to the server</div>')
|
|
|
|
if form.getvalue('ssh_cert'):
|
|
name = form.getvalue('name')
|
|
|
|
if not os.path.exists(os.getcwd()+'/keys/'):
|
|
os.makedirs(os.getcwd()+'/keys/')
|
|
|
|
ssh_keys = os.path.dirname(os.getcwd())+'/keys/'+name+'.pem'
|
|
|
|
try:
|
|
with open(ssh_keys, "w") as conf:
|
|
conf.write(form.getvalue('ssh_cert'))
|
|
except IOError:
|
|
print('<div class="alert alert-danger">Can\'t save ssh keys file. Check ssh keys path in config</div>')
|
|
else:
|
|
print('<div class="alert alert-success">Ssh key was save into: %s </div>' % ssh_keys)
|
|
try:
|
|
funct.logging("local", "users.py#ssh upload new ssh cert %s" % ssh_keys)
|
|
except:
|
|
pass
|
|
|
|
if serv and form.getvalue('ssl_cert'):
|
|
cert_local_dir = funct.get_config_var('main', 'cert_local_dir')
|
|
cert_path = sql.get_setting('cert_path')
|
|
|
|
if not os.path.exists(cert_local_dir):
|
|
os.makedirs(cert_local_dir)
|
|
|
|
if form.getvalue('ssl_name') is None:
|
|
print('<div class="alert alert-danger" style="float: left;">Please enter desired name</div>')
|
|
else:
|
|
name = form.getvalue('ssl_name') + '.pem'
|
|
|
|
try:
|
|
with open(name, "w") as ssl_cert:
|
|
ssl_cert.write(form.getvalue('ssl_cert'))
|
|
except IOError:
|
|
print('<div class="alert alert-danger style="float: left;"">Can\'t save ssl keys file. Check ssh keys path in config</div>')
|
|
else:
|
|
print('<div class="alert alert-success" style="float: left;">SSL file was upload to %s into: %s %s</div>' % (serv, cert_path, name))
|
|
|
|
MASTERS = sql.is_master(serv)
|
|
for master in MASTERS:
|
|
if master[0] != None:
|
|
funct.upload(master[0], cert_path, name)
|
|
try:
|
|
funct.upload(serv, cert_path, name)
|
|
except Exception as e:
|
|
funct.logging('localhost', e.args[0], haproxywi=1)
|
|
try:
|
|
os.system("mv %s %s" % (name, cert_local_dir))
|
|
except OSError as e:
|
|
funct.logging('localhost', e.args[0], haproxywi=1)
|
|
|
|
funct.logging(serv, "add.py#ssl upload new ssl cert %s" % name)
|
|
|
|
|
|
if form.getvalue('backend') is not None:
|
|
funct.show_backends(serv)
|
|
|
|
|
|
if form.getvalue('ip') is not None and serv is not None:
|
|
commands = [ "sudo ip a |grep inet |egrep -v '::1' |awk '{ print $2 }' |awk -F'/' '{ print $1 }'" ]
|
|
funct.ssh_command(serv, commands, ip="1")
|
|
|
|
|
|
if form.getvalue('showif'):
|
|
commands = ["sudo ip link|grep 'UP' | awk '{print $2}' |awk -F':' '{print $1}'"]
|
|
funct.ssh_command(serv, commands, ip="1")
|
|
|
|
|
|
if form.getvalue('action_hap') is not None and serv is not None:
|
|
action = form.getvalue('action_hap')
|
|
|
|
if funct.check_haproxy_config(serv):
|
|
commands = [ "sudo systemctl %s haproxy" % action ]
|
|
funct.ssh_command(serv, commands)
|
|
funct.logging(serv, 'HAProxy was '+action, haproxywi=1, login=1)
|
|
print("HAproxy was %s" % action)
|
|
else:
|
|
print("Bad config, check please")
|
|
|
|
|
|
if form.getvalue('action_waf') is not None and serv is not None:
|
|
serv = form.getvalue('serv')
|
|
action = form.getvalue('action_waf')
|
|
funct.logging(serv, 'WAF service was '+action, haproxywi=1, login=1)
|
|
commands = [ "sudo systemctl %s waf" % action ]
|
|
funct.ssh_command(serv, commands)
|
|
|
|
|
|
async def async_get_overview(serv1, serv2):
|
|
server_status = ()
|
|
commands2 = [ "ps ax |grep waf/bin/modsecurity |grep -v grep |wc -l" ]
|
|
cmd = 'echo "show info" |nc %s %s -w 1|grep -e "Process_num"' % (serv2, sql.get_setting('haproxy_sock_port'))
|
|
server_status = (serv1,
|
|
serv2,
|
|
funct.server_status(funct.subprocess_execute(cmd)),
|
|
sql.select_servers(server=serv2, keep_alive=1),
|
|
funct.ssh_command(serv2, commands2),
|
|
sql.select_waf_servers(serv2))
|
|
return server_status
|
|
|
|
async def get_runner_overview():
|
|
import http.cookies
|
|
from jinja2 import Environment, FileSystemLoader
|
|
env = Environment(loader=FileSystemLoader('templates/ajax'),extensions=['jinja2.ext.loopcontrols', 'jinja2.ext.do'])
|
|
|
|
servers = []
|
|
template = env.get_template('overview.html')
|
|
cookie = http.cookies.SimpleCookie(os.environ.get("HTTP_COOKIE"))
|
|
user_id = cookie.get('uuid')
|
|
futures = [async_get_overview(server[1], server[2]) for server in sql.get_dick_permit()]
|
|
for i, future in enumerate(asyncio.as_completed(futures)):
|
|
result = await future
|
|
servers.append(result)
|
|
servers_sorted = sorted(servers, key=funct.get_key)
|
|
template = template.render(service_status=servers_sorted, role=sql.get_user_role_by_uuid(user_id.value))
|
|
print(template)
|
|
|
|
|
|
if act == "overview":
|
|
ioloop = asyncio.get_event_loop()
|
|
ioloop.run_until_complete(get_runner_overview())
|
|
ioloop.close()
|
|
|
|
|
|
async def async_get_overviewWaf(serv1, serv2):
|
|
haproxy_dir = sql.get_setting('haproxy_dir')
|
|
server_status = ()
|
|
commands = [ "ps ax |grep waf/bin/modsecurity |grep -v grep |wc -l" ]
|
|
commands1 = [ "cat %s/waf/modsecurity.conf |grep SecRuleEngine |grep -v '#' |awk '{print $2}'" % haproxy_dir ]
|
|
|
|
server_status = (serv1,serv2, funct.ssh_command(serv2, commands), funct.ssh_command(serv2, commands1).strip(), sql.select_waf_metrics_enable_server(serv2))
|
|
return server_status
|
|
|
|
|
|
async def get_runner_overviewWaf(url):
|
|
import http.cookies
|
|
from jinja2 import Environment, FileSystemLoader
|
|
env = Environment(loader=FileSystemLoader('templates/ajax'),extensions=['jinja2.ext.loopcontrols', 'jinja2.ext.do'])
|
|
template = env.get_template('overivewWaf.html')
|
|
|
|
servers = []
|
|
cookie = http.cookies.SimpleCookie(os.environ.get("HTTP_COOKIE"))
|
|
user_id = cookie.get('uuid')
|
|
futures = [async_get_overviewWaf(server[1], server[2]) for server in sql.get_dick_permit()]
|
|
for i, future in enumerate(asyncio.as_completed(futures)):
|
|
result = await future
|
|
servers.append(result)
|
|
servers_sorted = sorted(servers, key=funct.get_key)
|
|
template = template.render(service_status=servers_sorted, role=sql.get_user_role_by_uuid(user_id.value), url=url)
|
|
print(template)
|
|
|
|
|
|
if act == "overviewwaf":
|
|
ioloop = asyncio.get_event_loop()
|
|
ioloop.run_until_complete(get_runner_overviewWaf(form.getvalue('page')))
|
|
ioloop.close()
|
|
|
|
|
|
async def async_get_overviewServers(serv1, serv2):
|
|
server_status = ()
|
|
commands = [ "top -u haproxy -b -n 1" ]
|
|
cmd = 'echo "show info" |nc %s %s -w 1|grep -e "Ver\|CurrConns\|Maxco\|MB\|Uptime:"' % (serv2, sql.get_setting('haproxy_sock_port'))
|
|
out = funct.subprocess_execute(cmd)
|
|
out1 = ""
|
|
|
|
for k in out:
|
|
if "Ncat:" not in k:
|
|
for r in k:
|
|
out1 += r
|
|
out1 += "<br />"
|
|
else:
|
|
out1 = "Can\'t connect to HAproxy"
|
|
|
|
server_status = (serv1,serv2, out1, funct.ssh_command(serv2, commands))
|
|
return server_status
|
|
|
|
|
|
async def get_runner_overviewServers(**kwargs):
|
|
import http.cookies
|
|
from jinja2 import Environment, FileSystemLoader
|
|
env = Environment(loader=FileSystemLoader('templates/ajax'),extensions=['jinja2.ext.loopcontrols', 'jinja2.ext.do'])
|
|
template = env.get_template('overviewServers.html')
|
|
|
|
servers = []
|
|
cookie = http.cookies.SimpleCookie(os.environ.get("HTTP_COOKIE"))
|
|
user_id = cookie.get('uuid')
|
|
role = sql.get_user_role_by_uuid(user_id.value)
|
|
futures = [async_get_overviewServers(kwargs.get('server1'), kwargs.get('server2'))]
|
|
|
|
for i, future in enumerate(asyncio.as_completed(futures)):
|
|
result = await future
|
|
servers.append(result)
|
|
servers_sorted = sorted(servers, key=funct.get_key)
|
|
template = template.render(service_status=servers_sorted, role=role, id=kwargs.get('id'))
|
|
print(template)
|
|
|
|
|
|
if act == "overviewServers":
|
|
id = form.getvalue('id')
|
|
name = form.getvalue('name')
|
|
ioloop = asyncio.get_event_loop()
|
|
ioloop.run_until_complete(get_runner_overviewServers(server1=name, server2=serv, id=id))
|
|
ioloop.close()
|
|
|
|
|
|
|
|
if act == "overviewHapwi":
|
|
from jinja2 import Environment, FileSystemLoader
|
|
env = Environment(loader=FileSystemLoader('templates/ajax'), autoescape=True)
|
|
template = env.get_template('/overviewHapwi.html')
|
|
cmd = "top -b -n 1 |head -9"
|
|
server_status, stderr = funct.subprocess_execute(cmd)
|
|
|
|
template = template.render(server_status=server_status,stderr=stderr)
|
|
print(template)
|
|
|
|
|
|
if form.getvalue('action'):
|
|
import requests
|
|
from requests_toolbelt.utils import dump
|
|
|
|
haproxy_user = sql.get_setting('stats_user')
|
|
haproxy_pass = sql.get_setting('stats_password')
|
|
stats_port = sql.get_setting('stats_port')
|
|
stats_page = sql.get_setting('stats_page')
|
|
|
|
postdata = {
|
|
'action' : form.getvalue('action'),
|
|
's' : form.getvalue('s'),
|
|
'b' : form.getvalue('b')
|
|
}
|
|
|
|
headers = {
|
|
'User-Agent' : 'Mozilla/5.0 (Windows NT 5.1; rv:20.0) Gecko/20100101 Firefox/20.0',
|
|
'Accept' : 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
|
|
'Accept-Language' : 'en-US,en;q=0.5',
|
|
'Accept-Encoding' : 'gzip, deflate'
|
|
}
|
|
|
|
q = requests.post('http://'+serv+':'+stats_port+'/'+stats_page, headers=headers, data=postdata, auth=(haproxy_user, haproxy_pass))
|
|
|
|
|
|
if serv is not None and act == "stats":
|
|
import requests
|
|
from requests_toolbelt.utils import dump
|
|
|
|
haproxy_user = sql.get_setting('stats_user')
|
|
haproxy_pass = sql.get_setting('stats_password')
|
|
stats_port = sql.get_setting('stats_port')
|
|
stats_page = sql.get_setting('stats_page')
|
|
try:
|
|
response = requests.get('http://%s:%s/%s' % (serv, stats_port, stats_page), auth=(haproxy_user, haproxy_pass))
|
|
except requests.exceptions.ConnectTimeout:
|
|
print('Oops. Connection timeout occured!')
|
|
except requests.exceptions.ReadTimeout:
|
|
print('Oops. Read timeout occured')
|
|
except requests.exceptions.HTTPError as errh:
|
|
print ("Http Error:",errh)
|
|
except requests.exceptions.ConnectionError as errc:
|
|
print ('<div class="alert alert-danger">Error Connecting: %s</div>' % errc)
|
|
except requests.exceptions.Timeout as errt:
|
|
print ("Timeout Error:",errt)
|
|
except requests.exceptions.RequestException as err:
|
|
print ("OOps: Something Else",err)
|
|
|
|
data = response.content
|
|
print(data.decode('utf-8'))
|
|
|
|
|
|
if serv is not None and form.getvalue('rows') is not None:
|
|
rows = form.getvalue('rows')
|
|
waf = form.getvalue('waf')
|
|
grep = form.getvalue('grep')
|
|
hour = form.getvalue('hour')
|
|
minut = form.getvalue('minut')
|
|
hour1 = form.getvalue('hour1')
|
|
minut1 = form.getvalue('minut1')
|
|
date = hour+':'+minut
|
|
date1 = hour1+':'+minut1
|
|
|
|
if grep is not None:
|
|
grep_act = '|grep'
|
|
else:
|
|
grep_act = ''
|
|
grep = ''
|
|
|
|
syslog_server_enable = sql.get_setting('syslog_server_enable')
|
|
if syslog_server_enable is None or syslog_server_enable == "0":
|
|
local_path_logs = sql.get_setting('local_path_logs')
|
|
syslog_server = serv
|
|
commands = [ "sudo cat %s| awk '$3>\"%s:00\" && $3<\"%s:00\"' |tail -%s %s %s" % (local_path_logs, date, date1, rows, grep_act, grep) ]
|
|
else:
|
|
commands = [ "sudo cat /var/log/%s/syslog.log | sed '/ %s:00/,/ %s:00/! d' |tail -%s %s %s" % (serv, date, date1, rows, grep_act, grep) ]
|
|
syslog_server = sql.get_setting('syslog_server')
|
|
|
|
if waf == "1":
|
|
local_path_logs = '/var/log/modsec_audit.log'
|
|
commands = [ "sudo cat %s |tail -%s %s %s" % (local_path_logs, rows, grep_act, grep) ]
|
|
|
|
funct.ssh_command(syslog_server, commands, show_log="1")
|
|
|
|
|
|
if serv is not None and form.getvalue('rows1') is not None:
|
|
rows = form.getvalue('rows1')
|
|
grep = form.getvalue('grep')
|
|
hour = form.getvalue('hour')
|
|
minut = form.getvalue('minut')
|
|
hour1 = form.getvalue('hour1')
|
|
minut1 = form.getvalue('minut1')
|
|
date = hour+':'+minut
|
|
date1 = hour1+':'+minut1
|
|
apache_log_path = sql.get_setting('apache_log_path')
|
|
|
|
if grep is not None:
|
|
grep_act = '|grep'
|
|
else:
|
|
grep_act = ''
|
|
grep = ''
|
|
|
|
if serv == 'haproxy-wi.access.log':
|
|
cmd="cat %s| awk -F\"/|:\" '$3>\"%s:00\" && $3<\"%s:00\"' |tail -%s %s %s" % (apache_log_path+"/"+serv, date, date1, rows, grep_act, grep)
|
|
else:
|
|
cmd="cat %s| awk '$4>\"%s:00\" && $4<\"%s:00\"' |tail -%s %s %s" % (apache_log_path+"/"+serv, date, date1, rows, grep_act, grep)
|
|
|
|
output, stderr = funct.subprocess_execute(cmd)
|
|
|
|
funct.show_log(output)
|
|
print(stderr)
|
|
|
|
|
|
if form.getvalue('viewlogs') is not None:
|
|
viewlog = form.getvalue('viewlogs')
|
|
log_path = funct.get_config_var('main', 'log_path')
|
|
rows = form.getvalue('rows')
|
|
grep = form.getvalue('grep')
|
|
hour = form.getvalue('hour')
|
|
minut = form.getvalue('minut')
|
|
hour1 = form.getvalue('hour1')
|
|
minut1 = form.getvalue('minut1')
|
|
date = hour+':'+minut
|
|
date1 = hour1+':'+minut1
|
|
|
|
if grep is not None:
|
|
grep_act = '|grep'
|
|
else:
|
|
grep_act = ''
|
|
grep = ''
|
|
|
|
cmd="cat %s| awk '$3>\"%s:00\" && $3<\"%s:00\"' |tail -%s %s %s" % (log_path + viewlog, date, date1, rows, grep_act, grep)
|
|
output, stderr = funct.subprocess_execute(cmd)
|
|
|
|
funct.show_log(output)
|
|
print(stderr)
|
|
|
|
|
|
if serv is not None and act == "showMap":
|
|
from datetime import datetime
|
|
from pytz import timezone
|
|
import networkx as nx
|
|
import matplotlib
|
|
matplotlib.use('Agg')
|
|
import matplotlib.pyplot as plt
|
|
|
|
stats_port= sql.get_setting('stats_port')
|
|
haproxy_config_path = sql.get_setting('haproxy_config_path')
|
|
hap_configs_dir = funct.get_config_var('configs', 'haproxy_save_configs_dir')
|
|
date = funct.get_data('config')
|
|
cfg = hap_configs_dir + serv + "-" + date + ".cfg"
|
|
|
|
print('<center>')
|
|
print("<h4>Map from %s</h4><br />" % serv)
|
|
|
|
G = nx.DiGraph()
|
|
|
|
error = funct.get_config(serv, cfg)
|
|
if error:
|
|
print('<div class="alert alert-danger">'+error+'</div>')
|
|
try:
|
|
conf = open(cfg, "r")
|
|
except IOError:
|
|
print('<div class="alert alert-danger">Can\'t read import config file</div>')
|
|
|
|
node = ""
|
|
line_new2 = [1,""]
|
|
i,k = 800, 800
|
|
j, m = 0, 0
|
|
for line in conf:
|
|
if line.startswith('listen') or line.startswith('frontend'):
|
|
if "stats" not in line:
|
|
node = line
|
|
i = i - 750
|
|
if line.find("backend") == 0:
|
|
node = line
|
|
i = i - 700
|
|
G.add_node(node,pos=(k,i),label_pos=(k,i+100))
|
|
|
|
if "bind" in line or (line.startswith('listen') and ":" in line) or (line.startswith('frontend') and ":" in line):
|
|
try:
|
|
bind = line.split(":")
|
|
if stats_port not in bind[1]:
|
|
bind[1] = bind[1].strip(' ')
|
|
bind = bind[1].split("crt")
|
|
node = node.strip(' \t\n\r')
|
|
node = node + ":" + bind[0]
|
|
G.add_node(node,pos=(k,i),label_pos=(k,i+100))
|
|
except:
|
|
pass
|
|
|
|
if "server " in line or "use_backend" in line or "default_backend" in line and "stats" not in line and "#" not in line:
|
|
if "timeout" not in line and "default-server" not in line and "#" not in line and "stats" not in line:
|
|
i = i - 1050
|
|
j = j + 1
|
|
if "check" in line:
|
|
line_new = line.split("check")
|
|
else:
|
|
line_new = line.split("if ")
|
|
if "server" in line:
|
|
line_new1 = line_new[0].split("server")
|
|
line_new[0] = line_new1[1]
|
|
line_new2 = line_new[0].split(":")
|
|
line_new[0] = line_new2[0]
|
|
|
|
line_new[0] = line_new[0].strip(' \t\n\r')
|
|
line_new2[1] = line_new2[1].strip(' \t\n\r')
|
|
|
|
if j % 2 == 0:
|
|
G.add_node(line_new[0],pos=(k+230,i-335),label_pos=(k+225,i-180))
|
|
else:
|
|
G.add_node(line_new[0],pos=(k-230,i-0),label_pos=(k-225,i+180))
|
|
|
|
if line_new2[1] != "":
|
|
G.add_edge(node, line_new[0], port=line_new2[1])
|
|
else:
|
|
G.add_edge(node,line_new[0])
|
|
|
|
os.system("/bin/rm -f " + cfg)
|
|
|
|
pos=nx.get_node_attributes(G,'pos')
|
|
pos_label=nx.get_node_attributes(G,'label_pos')
|
|
edge_labels = nx.get_edge_attributes(G,'port')
|
|
|
|
try:
|
|
plt.figure(10,figsize=(10,15))
|
|
nx.draw(G, pos, with_labels=False, font_weight='bold', width=3, alpha=0.1,linewidths=5)
|
|
nx.draw_networkx_nodes(G,pos, node_color="skyblue", node_size=100, alpha=0.8, node_shape="p")
|
|
nx.draw_networkx_labels(G,pos=pos_label, alpha=1, font_color="green", font_size=10)
|
|
nx.draw_networkx_edges(G,pos, width=0.5,alpha=0.5, edge_color="#5D9CEB",arrows=False)
|
|
nx.draw_networkx_edge_labels(G, pos,label_pos=0.5,font_color="blue", labels=edge_labels, font_size=8)
|
|
|
|
plt.savefig("map.png")
|
|
plt.show()
|
|
except Exception as e:
|
|
print('<div class="alert alert-danger">' + str(e) + '</div>')
|
|
|
|
cmd = "rm -f "+os.path.dirname(os.getcwd())+"/map*.png && mv map.png "+os.path.dirname(os.getcwd())+"/map"+date+".png"
|
|
output, stderr = funct.subprocess_execute(cmd)
|
|
print(stderr)
|
|
|
|
print('<img src="/map%s.png" alt="map">' % date)
|
|
|
|
|
|
if form.getvalue('servaction') is not None:
|
|
server_state_file = sql.get_setting('server_state_file')
|
|
haproxy_sock = sql.get_setting('haproxy_sock')
|
|
enable = form.getvalue('servaction')
|
|
backend = form.getvalue('servbackend')
|
|
cmd='echo "%s %s" |sudo socat stdio %s | cut -d "," -f 1-2,5-10,18,34-36 | column -s, -t' % (enable, backend, haproxy_sock)
|
|
|
|
if form.getvalue('save') == "on":
|
|
save_command = 'echo "show servers state" | sudo socat stdio %s > %s' % (haproxy_sock, server_state_file)
|
|
command = [ cmd, save_command ]
|
|
else:
|
|
command = [ cmd ]
|
|
|
|
if enable != "show":
|
|
print('<center><h3>You %s %s on HAproxy %s. <a href="viewsttats.py?serv=%s" title="View stat" target="_blank">Look it</a> or <a href="edit.py" title="Edit">Edit something else</a></h3><br />' % (enable, backend, serv, serv))
|
|
|
|
funct.ssh_command(serv, command, show_log="1")
|
|
action = 'edit.py ' + enable + ' ' + backend
|
|
funct.logging(serv, action)
|
|
|
|
|
|
if act == "showCompareConfigs":
|
|
import glob
|
|
from jinja2 import Environment, FileSystemLoader
|
|
env = Environment(loader=FileSystemLoader('templates/'), autoescape=True)
|
|
template = env.get_template('ajax/show_compare_configs.html')
|
|
left = form.getvalue('left')
|
|
right = form.getvalue('right')
|
|
|
|
template = template.render(serv=serv, right=right, left=left, return_files=funct.get_files())
|
|
print(template)
|
|
|
|
|
|
if serv is not None and form.getvalue('right') is not None:
|
|
from jinja2 import Environment, FileSystemLoader
|
|
left = form.getvalue('left')
|
|
right = form.getvalue('right')
|
|
hap_configs_dir = funct.get_config_var('configs', 'haproxy_save_configs_dir')
|
|
cmd='diff -ub %s%s %s%s' % (hap_configs_dir, left, hap_configs_dir, right)
|
|
env = Environment(loader=FileSystemLoader('templates/'), autoescape=True, extensions=['jinja2.ext.loopcontrols', "jinja2.ext.do"])
|
|
template = env.get_template('ajax/compare.html')
|
|
|
|
output, stderr = funct.subprocess_execute(cmd)
|
|
template = template.render(stdout=output)
|
|
|
|
print(template)
|
|
print(stderr)
|
|
|
|
|
|
if serv is not None and act == "configShow":
|
|
hap_configs_dir = funct.get_config_var('configs', 'haproxy_save_configs_dir')
|
|
|
|
if form.getvalue('configver') is None:
|
|
cfg = hap_configs_dir + serv + "-" + funct.get_data('config') + ".cfg"
|
|
funct.get_config(serv, cfg)
|
|
else:
|
|
cfg = hap_configs_dir + form.getvalue('configver')
|
|
|
|
try:
|
|
conf = open(cfg, "r")
|
|
except IOError:
|
|
print('<div class="alert alert-danger">Can\'t read import config file</div>')
|
|
|
|
from jinja2 import Environment, FileSystemLoader
|
|
env = Environment(loader=FileSystemLoader('templates/ajax'), autoescape=True, extensions=['jinja2.ext.loopcontrols'])
|
|
template = env.get_template('config_show.html')
|
|
|
|
template = template.render(conf=conf, view=form.getvalue('view'), serv=serv, configver=form.getvalue('configver'), role=funct.is_admin(level=2))
|
|
print(template)
|
|
|
|
if form.getvalue('configver') is None:
|
|
os.system("/bin/rm -f " + cfg)
|
|
|
|
|
|
if form.getvalue('master'):
|
|
master = form.getvalue('master')
|
|
slave = form.getvalue('slave')
|
|
interface = form.getvalue('interface')
|
|
vrrpip = form.getvalue('vrrpip')
|
|
tmp_config_path = sql.get_setting('tmp_config_path')
|
|
script = "install_keepalived.sh"
|
|
|
|
if form.getvalue('hap') == "1":
|
|
funct.install_haproxy(master)
|
|
funct.install_haproxy(slave)
|
|
|
|
if form.getvalue('syn_flood') == "1":
|
|
funct.syn_flood_protect(master)
|
|
funct.syn_flood_protect(slave)
|
|
|
|
os.system("cp scripts/%s ." % script)
|
|
|
|
error = str(funct.upload(master, tmp_config_path, script))
|
|
if error:
|
|
print('error: '+error)
|
|
sys.exit()
|
|
funct.upload(slave, tmp_config_path, script)
|
|
|
|
funct.ssh_command(master, ["sudo chmod +x "+tmp_config_path+script, tmp_config_path+script+" MASTER "+interface+" "+vrrpip])
|
|
funct.ssh_command(slave, ["sudo chmod +x "+tmp_config_path+script, tmp_config_path+script+" BACKUP "+interface+" "+vrrpip])
|
|
|
|
os.system("rm -f %s" % script)
|
|
sql.update_server_master(master, slave)
|
|
|
|
|
|
if form.getvalue('masteradd'):
|
|
master = form.getvalue('masteradd')
|
|
slave = form.getvalue('slaveadd')
|
|
interface = form.getvalue('interfaceadd')
|
|
vrrpip = form.getvalue('vrrpipadd')
|
|
kp = form.getvalue('kp')
|
|
tmp_config_path = sql.get_setting('tmp_config_path')
|
|
script = "add_vrrp.sh"
|
|
|
|
os.system("cp scripts/%s ." % script)
|
|
|
|
error = str(funct.upload(master, tmp_config_path, script))
|
|
if error:
|
|
print('error: '+error)
|
|
sys.exit()
|
|
funct.upload(slave, tmp_config_path, script)
|
|
|
|
funct.ssh_command(master, ["sudo chmod +x "+tmp_config_path+script, tmp_config_path+script+" MASTER "+interface+" "+vrrpip+" "+kp])
|
|
funct.ssh_command(slave, ["sudo chmod +x "+tmp_config_path+script, tmp_config_path+script+" BACKUP "+interface+" "+vrrpip+" "+kp])
|
|
|
|
os.system("rm -f %s" % script)
|
|
|
|
|
|
if form.getvalue('haproxyaddserv'):
|
|
funct.install_haproxy(form.getvalue('haproxyaddserv'), syn_flood=form.getvalue('syn_flood'), hapver=form.getvalue('hapver'))
|
|
|
|
|
|
if form.getvalue('installwaf'):
|
|
funct.waf_install(form.getvalue('installwaf'))
|
|
|
|
|
|
if form.getvalue('update_haproxy_wi'):
|
|
funct.update_haproxy_wi()
|
|
|
|
|
|
if form.getvalue('metrics_waf'):
|
|
sql.update_waf_metrics_enable(form.getvalue('metrics_waf'), form.getvalue('enable'))
|
|
|
|
|
|
if form.getvalue('table_metrics'):
|
|
import http.cookies
|
|
from jinja2 import Environment, FileSystemLoader
|
|
env = Environment(loader=FileSystemLoader('templates/ajax'))
|
|
template = env.get_template('table_metrics.html')
|
|
|
|
cookie = http.cookies.SimpleCookie(os.environ.get("HTTP_COOKIE"))
|
|
user_id = cookie.get('uuid')
|
|
table_stat = sql.select_table_metrics(user_id.value)
|
|
|
|
template = template.render(table_stat=sql.select_table_metrics(user_id.value))
|
|
print(template)
|
|
|
|
|
|
if form.getvalue('new_metrics'):
|
|
serv = form.getvalue('server')
|
|
metric = sql.select_metrics(serv)
|
|
metrics = {}
|
|
metrics['chartData'] = {}
|
|
metrics['chartData']['labels'] = {}
|
|
labels = ''
|
|
curr_con = ''
|
|
curr_ssl_con = ''
|
|
sess_rate = ''
|
|
|
|
for i in metric:
|
|
label = str(i[5])
|
|
label = label.split(' ')[1]
|
|
#label = label.split(':')
|
|
#labels += label[0]+':'+label[1]+','
|
|
labels += label+','
|
|
curr_con += str(i[1])+','
|
|
curr_ssl_con += str(i[2])+','
|
|
sess_rate += str(i[3])+','
|
|
server = str(i[0])
|
|
|
|
metrics['chartData']['labels'] = labels
|
|
metrics['chartData']['curr_con'] = curr_con
|
|
metrics['chartData']['curr_ssl_con'] = curr_ssl_con
|
|
metrics['chartData']['sess_rate'] = sess_rate
|
|
metrics['chartData']['server'] = server
|
|
|
|
import json
|
|
print(json.dumps(metrics))
|
|
|
|
|
|
if form.getvalue('new_waf_metrics'):
|
|
serv = form.getvalue('server')
|
|
metric = sql.select_waf_metrics(serv)
|
|
metrics = {}
|
|
metrics['chartData'] = {}
|
|
metrics['chartData']['labels'] = {}
|
|
labels = ''
|
|
curr_con = ''
|
|
|
|
for i in metric:
|
|
label = str(i[2])
|
|
label = label.split(' ')[1]
|
|
# label = label.split(':')
|
|
labels += label[0]+','
|
|
curr_con += str(i[1])+','
|
|
|
|
metrics['chartData']['labels'] = labels
|
|
metrics['chartData']['curr_con'] = curr_con
|
|
metrics['chartData']['server'] = serv
|
|
|
|
import json
|
|
print(json.dumps(metrics))
|
|
|
|
|
|
if form.getvalue('get_hap_v'):
|
|
output = funct.check_haproxy_version(serv)
|
|
print(output)
|
|
|
|
|
|
if form.getvalue('bwlists'):
|
|
list = os.path.dirname(os.getcwd())+"/"+sql.get_setting('lists_path')+"/"+form.getvalue('group')+"/"+form.getvalue('color')+"/"+form.getvalue('bwlists')
|
|
try:
|
|
file = open(list, "r")
|
|
file_read = file.read()
|
|
file.close
|
|
print(file_read)
|
|
except IOError:
|
|
print('<div class="alert alert-danger" style="margin:0">Cat\'n read '+form.getvalue('color')+' list</div>')
|
|
|
|
|
|
if form.getvalue('bwlists_create'):
|
|
list_name = form.getvalue('bwlists_create').split('.')[0]
|
|
list_name += '.lst'
|
|
list = os.path.dirname(os.getcwd())+"/"+sql.get_setting('lists_path')+"/"+form.getvalue('group')+"/"+form.getvalue('color')+"/"+list_name
|
|
try:
|
|
open(list, 'a').close()
|
|
print('<div class="alert alert-success" style="margin:0">'+form.getvalue('color')+' list was created</div>')
|
|
except IOError as e:
|
|
print('<div class="alert alert-danger" style="margin:0">Cat\'n create new '+form.getvalue('color')+' list. %s </div>' % e)
|
|
|
|
|
|
if form.getvalue('bwlists_save'):
|
|
list = os.path.dirname(os.getcwd())+"/"+sql.get_setting('lists_path')+"/"+form.getvalue('group')+"/"+form.getvalue('color')+"/"+form.getvalue('bwlists_save')
|
|
try:
|
|
with open(list, "w") as file:
|
|
file.write(form.getvalue('bwlists_content'))
|
|
except IOError as e:
|
|
print('<div class="alert alert-danger" style="margin:0">Cat\'n save '+form.getvalue('color')+' list. %s </div>' % e)
|
|
|
|
servers = sql.get_dick_permit()
|
|
path = sql.get_setting('haproxy_dir')+"/"+form.getvalue('color')
|
|
|
|
for server in servers:
|
|
funct.ssh_command(server[2], ["sudo mkdir "+path])
|
|
error = funct.upload(server[2], path+"/"+form.getvalue('bwlists_save'), list, dir='fullpath')
|
|
if error:
|
|
print('<div class="alert alert-danger">Upload fail: %s</div>' % error)
|
|
else:
|
|
print('<div class="alert alert-success" style="margin:10px">Edited '+form.getvalue('color')+' list was uploaded to '+server[1]+'</div>')
|
|
if form.getvalue('bwlists_restart') == 'restart':
|
|
funct.ssh_command(server[2], ["sudo " + sql.get_setting('restart_command')])
|
|
|
|
|
|
if form.getvalue('get_lists'):
|
|
list = os.path.dirname(os.getcwd())+"/"+sql.get_setting('lists_path')+"/"+form.getvalue('group')+"/"+form.getvalue('color')
|
|
lists = funct.get_files(dir=list, format="lst")
|
|
for list in lists:
|
|
print(list)
|
|
|
|
|
|
if form.getvalue('get_ldap_email'):
|
|
username = form.getvalue('get_ldap_email')
|
|
import ldap
|
|
|
|
server = sql.get_setting('ldap_server')
|
|
port = sql.get_setting('ldap_port')
|
|
user = sql.get_setting('ldap_user')
|
|
password = sql.get_setting('ldap_password')
|
|
ldap_base = sql.get_setting('ldap_base')
|
|
domain = sql.get_setting('ldap_domain')
|
|
ldap_search_field = sql.get_setting('ldap_search_field')
|
|
|
|
l = ldap.initialize("ldap://"+server+':'+port)
|
|
try:
|
|
l.protocol_version = ldap.VERSION3
|
|
l.set_option(ldap.OPT_REFERRALS, 0)
|
|
|
|
bind = l.simple_bind_s(user, password)
|
|
|
|
criteria = "(&(objectClass=user)(sAMAccountName="+username+"))"
|
|
attributes = [ldap_search_field]
|
|
result = l.search_s(ldap_base, ldap.SCOPE_SUBTREE, criteria, attributes)
|
|
|
|
results = [entry for dn, entry in result if isinstance(entry, dict)]
|
|
try:
|
|
print('["'+results[0][ldap_search_field][0].decode("utf-8")+'","'+domain+'"]')
|
|
except:
|
|
print('error: user not found')
|
|
finally:
|
|
l.unbind()
|
|
|
|
|
|
if form.getvalue('change_waf_mode'):
|
|
waf_mode = form.getvalue('change_waf_mode')
|
|
server_hostname = form.getvalue('server_hostname')
|
|
haproxy_dir = sql.get_setting('haproxy_dir')
|
|
serv = sql.select_server_by_name(server_hostname)
|
|
commands = [ "sudo sed -i 's/^SecRuleEngine.*/SecRuleEngine %s/' %s/waf/modsecurity.conf " % (waf_mode, haproxy_dir) ]
|
|
funct.ssh_command(serv, commands) |